Create and deliver personalized experiences across digital properties at scale
Build engaging websites with intuitive web content management
Leverage a complete UI toolbox for web, mobile and desktop development
Build, protect and deploy apps across any platform and mobile device
Build mobile apps for iOS, Android and Windows Phone
Rapidly develop, manage and deploy business apps, delivered as SaaS in the cloud
Automate UI, load and performance testing for web, desktop and mobile
Host, deploy and scale Node.js, Java and .NET Core apps on premise or in the cloud
Optimize data integration with high-performance connectivity
Automate decision processes with a no-code business rules engine
Transform your businesses in order to survive in a completely digitized and connected world driven by software innovation.
Globally scale websites with innovative content management and infrastructure approaches
Content-focused web and mobile solution for empowering marketers
Faster, tailored mobile experiences for any device and data source
UX and app modernization to powerfully navigate today's digital landscape
Fuel agility with ever-ready applications, built in the cloud
Recently, I came across an article in the Wall Street Journal about hackers stealing money and other information from small businesses and the lawsuits that typically follow from such an ordeal. I am not sure which is worse: the theft of “stuff” (i.e. money, data, information, etc.) or the expense of litigation. Either way, these are costs that can be avoided with a little bit of preventative effort.
I have heard small business owners say, “we don’t have the time to keep up” or “we don’t have the dedicated IT resources” or my new personal favorite, “we are a small business – we are too small to be targeted by hackers.”
Think again - here are some “not-so-small” statistics:
Here’s a key point to remember: most hackers want to get the biggest bang for their buck in the shortest amount of time. They want to steal the most data with the least effort so they can reduce the risk of getting caught. Therefore, they will target the database, so you better make sure it is protected. Physical security (e.g. card access to the building), firewalls, and secure communications are the front-line defenses, but don’t forget to protect the database itself.
You might be saying to yourself, “we don’t store sensitive data like credit cards, social security numbers, or medical records in our database so we are all set.” That may be true, but what would be the impact to your business if “non-sensitive” information were stolen and put in the hands of your competitors, such as the names of your exclusive vendors/suppliers and your negotiated prices, rates, and terms?
Hackers can bring down even the smallest business that is not properly protected – and that’s an expense no small business should ever have to pay.
Thanks and as always, please feel free to drop me a line and let me know what you think.
View all posts from Matt Cicciari on the Progress blog. Connect with us about all things application development and deployment, data integration and digital business.
Copyright © 2016, Progress Software Corporation and/or its subsidiaries or affiliates.
All Rights Reserved.
Progress, Telerik, and certain product names used herein are trademarks or registered trademarks of Progress Software Corporation and/or one of its subsidiaries or affiliates in the U.S. and/or other countries. See Trademarks or appropriate markings.